US20110225628A1 - Information input assistance device, computer-readable medium, and information input assistance method - Google Patents
Information input assistance device, computer-readable medium, and information input assistance method Download PDFInfo
- Publication number
- US20110225628A1 US20110225628A1 US12/858,939 US85893910A US2011225628A1 US 20110225628 A1 US20110225628 A1 US 20110225628A1 US 85893910 A US85893910 A US 85893910A US 2011225628 A1 US2011225628 A1 US 2011225628A1
- Authority
- US
- United States
- Prior art keywords
- information
- input
- rule
- user
- attribute information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
- G06F40/174—Form filling; Merging
Definitions
- the present invention relates to an information input assistance device, a computer-readable medium storing an information input assistance program, and an information input assistance method.
- an information input assistance device including: an identification unit that identifies a user; a generation unit that acquires attribute information corresponding to the user identified by the identification unit from a first memory which stores attribute information of users in regard to a plurality of users, acquires rule information corresponding to a transmission destination of input information and a class of input information from a second memory which stores, in correspondence with transmission destinations of input information and classes of input information, rule information representing rules for generating input information from attribute information of users, and generates the input information corresponding to the identified user on the basis of the acquired attribute information and the acquired rule information; and a processing unit that performs processing that transmits the input information generated by the generation unit to the transmission destination.
- FIG. 1 is a block diagram showing the general configuration of a computer system pertaining to the exemplary embodiment
- FIGS. 2A and 2B are flowcharts showing the content of AP server connection processing
- FIGS. 3A and 3B are flowcharts showing the content of rule information addition processing
- FIGS. 4A to 4F are conceptual diagrams each showing one example of an authentication information input screen and a virtual keyboard.
- FIGS. 5A to 5E are general diagrams each showing one example of a connection destination-based rule table and a rule definition table that configure a rule information table.
- FIG. 1 there is shown the general configuration of a computer system 10 pertaining to the present exemplary embodiment.
- the computer system 10 is configured of an image reading and printing apparatus 14 , plural terminal devices 26 including personal computers (PCs) or the like, a management server 36 , and plural application servers (AP servers) 40 being connected to a network 12 including a local area network (LAN) or the Internet.
- PCs personal computers
- AP servers application servers
- the image reading and printing apparatus 14 is equipped with a main controller 16 that includes a microcomputer or the like and has a built-in CPU 16 A, a built-in memory 16 B, a built-in nonvolatile storage unit 16 C including a hard disk drive (HDD) or a flash memory, and a built-in network interface (I/F) 16 D.
- a main controller 16 that includes a microcomputer or the like and has a built-in CPU 16 A, a built-in memory 16 B, a built-in nonvolatile storage unit 16 C including a hard disk drive (HDD) or a flash memory, and a built-in network interface (I/F) 16 D.
- a main controller 16 that includes a microcomputer or the like and has a built-in CPU 16 A, a built-in memory 16 B, a built-in nonvolatile storage unit 16 C including a hard disk drive (HDD) or a flash memory, and a built-in network interface (I/F) 16 D.
- An image reading unit 18 that optically reads reading target documents (paper documents) set thereon and outputs reading image data
- an image printing unit 20 that prints an image represented by printing image data inputted thereto on recording paper
- an operation panel 22 disposed with a display unit 22 A serving as a display unit including an LCD or the like and an operation unit 22 B serving as an input reception unit including a numerical keypad and a touch panel
- a card reader 24 that reads information such as card IDs recorded in IC cards (not shown) carried by individual users of the computer system 10 are each connected to the main controller 16 .
- the card reader 24 is one example of an identification unit of the present invention.
- the network I/F unit 16 D of the main controller 16 is connected to the network 12 and performs communication via the network 12 with the terminal devices 26 .
- a service provision program and an AP server connection program are each installed in the storage unit 16 C of the main controller 16 as programs executed by the CPU 16 A.
- the service provision program is for controlling the operation of each unit of the image reading and printing apparatus 14 and providing various kinds of services (e.g., copying of documents, printing of documents (printing of documents represented by document data received from the terminal devices 26 or represented by document data registered in databases (DBs) stored in storage units of the AP servers 40 ), and scan-to-server (a service that reads a document and uploads reading image data to the AP servers 40 to thereby cause the reading image data to be stored in storage areas disposed beforehand on the storage units of the AP servers 40 )) to the users.
- the AP server connection program is for the CPU 16 A to perform AP server connection processing described later.
- a rule information table (details described later) is also stored in the storage unit 16 C.
- the storage unit 16 C of the main controller 16 is one example of a second memory of the present invention.
- the AP server connection program is one aspect of an information input assistance program pertaining to the present invention.
- the AP server connection program is executed by the CPU 16 A of the main controller 16 of the image reading and printing apparatus 14 , whereby the image reading and printing apparatus 14 functions as one example of an information input assistance device pertaining to the present invention.
- the individual AP servers 40 are computers for providing services (e.g., as described above, the service that prints DB-registered documents, the scan-to-server service) using the AP servers 40 to the users in cooperation with the image reading and printing apparatus 14 .
- Application programs for realizing the services described above are installed in the storage units of the AP servers 40 .
- a display 28 , a keyboard 30 , and a mouse 32 are each connected to each of the individual terminal devices 26 .
- a user attribute information table in which plural categories of attribute information—such as user IDs, employee numbers, email addresses, and card IDs recorded in IC cards carried by the individual users—are registered in regard to the individual users of the computer system 10 is stored in a nonvolatile storage unit (not shown) of the management server 36 .
- the storage unit of the management server 36 is one example of a first memory of the present invention.
- the main controller 16 of the image reading and printing apparatus 14 performs service provision processing that provides the various kinds of services to the users as a result of the service provision program being executed by the CPU 16 A.
- service provision processing When a user goes to the place where the image reading and printing apparatus 14 is installed, undergoes user authentication processing where the card reader 24 is caused to read information such as the card ID recorded in the IC card carried by the user, and selects a service using one of the AP servers 40 as a use target service, the service provision processing performs processing that calls up the AP server connection program in order to connect to the AP server 40 providing the selected service.
- the AP server connection program is executed by the CPU 16 A, whereby the AP server connection processing is performed by the main controller 16 of the image reading and printing apparatus 14 .
- This AP server connection processing will be described below with reference to FIG. 2A and 2B .
- connection destination of the AP server 40 for receiving provision of that service is recognized and information requesting connection is transmitted to the connection destination it has recognized.
- connection destination information e.g., connection destination uniform resource locators (URLs)
- URLs connection destination uniform resource locators
- the information of the webpage transmitted from the connection destination AP server 40 is received to thereby acquire that information.
- the AP server 40 delivers to the image reading and printing apparatus 14 information of another screen (e.g., a screen on which details and the like of the provided service are selectable) other than an authentication information input screen.
- the other screen is displayed on the display unit 22 A of the operation panel 22 , the determination of step 104 becomes NO, the AP server connection processing ends, and the control returns to the service provision processing.
- the AP server 40 delivers to the image reading and printing apparatus 14 information of an authentication information input screen on which a user ID input field 50 and a password input field 52 are each disposed as shown in FIG. 4A as an example.
- This authentication information input screen is described in HyperText Markup Language (HTML), and a tag indicating that the field is a user ID input field is added to the user ID input field 50 and a tag indicating that the field is the password input field is added to the password input field 52 .
- HTML HyperText Markup Language
- the image reading and printing apparatus 14 receives the information of the authentication information input screen, it analyzes the tags added to the input fields 50 and 52 to thereby recognize that the class of information that should be inputted into the input field 50 is “user ID” and the class of information that should be inputted into the input field 52 is “password”.
- the delivered authentication information input screen is displayed on the display unit 22 A of the operation panel 22 , the determination of step 104 becomes YES, and the control moves to step 106 .
- AP servers 40 there also exist AP servers 40 of a specification that does not deliver the information of the authentication information input screen to the connection source device but delivers only error information indicating that connection is not allowed because it has no authentication information.
- the connection destination AP server 40 is an AP server 40 of this specification
- an authentication information input screen on which a user ID input field 50 and a password input field 52 are each disposed as shown in FIG. 4A as an example is generated by the image reading and printing apparatus 14 that is a connection source device, and the generated authentication information input screen is displayed on the display unit 22 A of the operation panel 22 .
- the determination of step 104 becomes YES, and the control moves to step 106 .
- step 106 user identification information (the card ID read from the IC card carried by the user) is transmitted to the management server 36 to thereby request attribute information of the user specified by the transmitted user identification information.
- the management server 36 searches the user attribute information table for the user identification information received from the image reading and printing apparatus 14 , reads from the user attribute information table all of the attribute information (user ID, employee number, email address, etc.) corresponding to the same user as the user identification information received, and transmits all of that attribute information to the main controller 16 .
- the main controller 16 receives these pieces of attribute information and stores them in the memory 16 B.
- user IDs for using the AP servers 40 are assigned in accordance with assignment rules on the side of the service providers, and passwords are also set so as to satisfy standards (e.g., numbers of digits and kinds of usable characters) that the service providers have decided upon, so it is necessary for a user receiving provision of services realized as a result of the image reading and printing apparatus 14 cooperating with the AP servers 40 provided by the outside service providers to input authentication information (user ID and password) that differs per service using the AP servers 40 provided by the mutually different service providers.
- standards e.g., numbers of digits and kinds of usable characters
- the rule information table is stored in the storage unit 16 C of the main controller 16 .
- This rule information table is configured from a connection destination-based rule table shown in FIG. 5A and a rule definition table shown in FIG. 5B .
- the connection destination-based rule table is configured as a result of pieces of rule information representing input information rules each being registered, in regard to mutually different plural kinds of services using the AP servers 40 , in correspondence with connection destination information (connection destination URLs) for receiving provision of those services and classes of information (in the example shown in FIG.
- rule definition table is configured as a result of pieces of information representing a name, content, and a type of rule each being registered in regard to all rules applied to at least one class of input information of the classes of input information (e.g., “user ID” and “password”).
- rule information of the user IDs and passwords registered in the connection destination-based rule table in regard to a user ID or a password that applies a rule whose content is registered in the rule definition table, only the name of the rule (“rule 1 ”, “rule 2 ”, etc.) is registered as the rule information.
- step 108 the connection destination-based rule table is searched for the connection destination information used in the information transmission in step 100 and the class of input information recognized on the basis of the tags added to the input fields of the authentication information input screen.
- step 110 it is determined, on the basis of the result of the search in step 108 , whether or not rule information corresponding to the connection destination for receiving provision of the service selected by the user and the class of input information is registered in the connection destination-based rule table.
- this determination is YES
- the control moves to step 112 , reads the corresponding rule information, and causes the memory 16 B to store that rule information.
- description will be advanced taking as an example a case where the classes of input information for receiving provision of the service selected by the user are “user ID” and “password”.
- the content of the rule represented by the rule information corresponding to the “user ID” class of input information of the rule information read in step 112 is determined and the processing branches depending on the determination result.
- rules corresponding to “user ID” any of a first type (form) of rules (rules 2 and 3 shown in FIG. 5B ) that designate a category of the attribute information to be used as the user ID, a second type (form) of rules (rule 4 shown in FIG. 5B ) that designate a category of the attribute information to be used as the user ID and designates a method of editing the designated attribute information, and a third type (form) of rules (see “fixed value ('anonymous')” shown in FIG.
- connection destination-base rule table any of the first to third types of rules is set as rules corresponding to the user ID for each of the individual connection destinations depending on the user ID application rule in the individual connection destinations.
- step 112 When the user ID rule information read in step 112 represents rule content corresponding to the first type of rule, the control moves from step 114 to step 116 and attribute information of the category designated by the user ID rule information read in step 112 is extracted as the user ID from among the pieces of user attribute information acquired in step 106 . Then, the control moves to step 122 .
- step 112 When the user ID rule information read in step 112 represents rule content corresponding to the second type of rule, the control moves from step 114 to step 118 and attribute information of the category designated by the user ID rule information read in step 112 is extracted from among the pieces of user attribute information acquired in step 106 .
- step 120 a user ID is generated by editing, in accordance with the editing method designated by the user ID rule information read in step 112 , the attribute information extracted in step 118 . Then, the control moves to step 122 .
- step 112 When the user ID rule information read in step 112 represents rule content corresponding to the third type of rule, the control moves from step 114 to step 121 and the fixed value stipulated by the rule information is set as the user ID. Then, the control moves to step 122 .
- Step 106 to step 121 described above are, together with step 128 described below, one example of processing by a generation unit of the present invention.
- step 122 the user ID obtained by the processing of step 116 or step 120 or step 121 is set inside the user ID input field 50 of the authentication information input screen being displayed on the display unit 22 A of the operation panel 22 .
- the proper user ID is set and displayed in accordance with the user ID rule (rule information) registered in the connection destination-based rule table and without the user having to perform an operation that inputs the user ID.
- Step 122 is one example of processing by a processing unit of the present invention.
- step 124 the content of the rule represented by the rule information corresponding to the “password” class of input information of the rule information read in step 112 is determined and the processing branches depending on the determination result.
- rules corresponding to “password” either of a fourth type (form) of rule (rule 1 shown in FIG. 5B ) that asks the user to input the password and a fifth type (form) of rule (“fixed value (‘’”) shown in FIG. 5A ) that designates a fixed value as the password is used.
- the fourth type of rule or the fifth type of rule is set as a password rule for each of the individual connection destinations depending on the password application rule (fixed value or not) in the individual connection destinations.
- step 112 When the password rule information read in step 112 represents rule content corresponding to the fourth type of rule, the control moves from step 124 to step 126 and it is determined whether or not the password has been inputted by the user. Step 126 is repeated until the determination becomes YES.
- the determination of step 126 becomes YES and the control moves to step 132 .
- FIG. 4C there is shown a state where the password has been inputted inside the password input field 52 by the user after the user ID has been set and displayed inside the user ID input field 50 of the authentication information input screen.
- step 112 When the password rule information read in step 112 represents rule content corresponding to the fifth type of rule, the control moves from step 124 to step 128 and the fixed value stipulated by the rule information is set as the password. Then, the control moves to step 132 .
- step 132 it is determined whether or not transmission of the user ID and the password has been instructed. Step 132 is repeated until the determination becomes YES.
- a button 54 for instructing transmission of the user ID and the password.
- the determination of step 132 becomes YES and the control moves to step 134 .
- step 134 the user ID being displayed inside the input field 50 and the password being displayed inside the input field 52 of the authentication information input screen are transmitted to the connection destination to which information requesting connection is transmitted in step 100 .
- connection destination AP server 40 on the basis of the combination of the user ID and the password received from the image reading and printing apparatus 14 , user authentication processing that verifies whether or not the user requesting provision of a service via the image reading and printing apparatus 14 is a legitimate user is performed.
- the AP server 40 delivers to the image reading and printing apparatus 14 information of another screen (e.g., a screen on which details and the like of the provided service are selectable) other than the authentication information input screen.
- the image reading and printing apparatus 14 When the image reading and printing apparatus 14 receives this information, it displays on the display unit 22 A of the operation panel 22 the screen (webpage) represented by the information received from the AP server 40 in step 136 and ends the AP server connection processing. Thus, the control returns to the service provision processing.
- step 150 the display unit 22 A of the operation panel 22 displays a virtual keyboard 60 disposed with a user ID input field 56 and plural keys 58 for inputting the user ID.
- the virtual keyboard 60 additionally displays rule buttons 62 corresponding to the extracted individual rules, and also the virtual keyboard 60 additionally displays a button 64 for instructing generation of rule information that sets as a fixed value the user ID inputted inside the input field 56 .
- step 152 it is determined whether or not the operation by the user is an operation that selects one of the rule buttons 62 .
- the virtual keyboard 60 is displayed on the display unit 22 A of the operation panel 22 , the user recognizes the user ID application rule in the connection destination this time and judges whether or not the recognized application rule matches a user ID rule represented by any of the rule buttons 62 being displayed on the virtual keyboard 60 .
- the user performs an operation that selects that rule button 62 .
- the determination of step 152 becomes YES and the control moves to step 154 .
- step 154 the content of the user ID rule represented by the rule button 62 selected by the user is determined and the processing branches depending on the determination result.
- the control moves from step 154 to step 156 and attribute information of the category designated by the user ID rule represented by the rule button 62 selected by the user is extracted as the user ID from among the pieces of user attribute information acquired in step 106 . Then, the control moves to step 162 .
- step 154 When the content of the user ID rule represented by the rule button 62 selected by the user is rule content corresponding to the second type of rule, the control moves from step 154 to step 158 and attribute information of the category designated by the user ID rule represented by the rule button 62 selected by the user is extracted from among the pieces of user attribute information acquired in step 106 .
- step 160 a user ID is generated by editing, in accordance with the editing method designated by the user ID rule represented by the rule button 62 selected by the user, the attribute information extracted in step 158 . Then, the control moves to step 162 .
- step 162 the user ID rule information represented by the rule button 62 selected by the user additionally registered in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time.
- Step 150 to step 164 described above are one example of processing by the generation unit of the present invention.
- step 164 the display unit 22 A of the operation panel 22 redisplays the authentication information input screen and the user ID generated in step 156 or step 160 is set inside the user ID input field 50 of the redisplayed authentication information input screen.
- the proper user ID is set and displayed in accordance with the user ID rule represented by the rule button 62 selected by the user and without the user having to perform an operation that inputs the user ID.
- step 166 a button 66 (see also FIG. 4E ) for instructing generation of rule information that sets as a fixed value the password inputted into the password input field 52 additionally displays on the authentication information input screen redisplayed on the display unit 22 A of the operation panel 22 .
- step 168 it is determined whether or not the password has been inputted by the user. Step 168 is repeated until the determination becomes YES.
- the user recognizes the password application rule (fixed value or not) in the connection destination this time, and if the recognized application rule is a fixed value, the user selects the button 66 on the authentication information input screen and thereafter performs an operation that inputs the password inside the password input field 52 , and if the recognized application rule is not a fixed value, the user does not select the button 66 on the authentication information input screen and performs an operation that inputs the password inside the password input field 52 .
- step 168 When the password is inputted inside the password input field 52 as a result of any of the operations described above being performed, the determination of step 168 becomes YES and the control moves to step 170 , where it is determined whether or not an operation that selects the button 66 has been performed by the user. When this determination is NO, the control moves to step 171 and password rule information representing the fourth type of rule that asks the user to input the password is additionally registered in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time. Then, the rule information addition processing ends.
- step 170 When the determination of step 170 is YES, the control moves to step 172 and additionally registers, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time, password rule information representing the fifth type of rule that designates as a fixed value of the password the password inputted inside the password input field 52 by the user. Then, the rule information addition processing ends.
- connection to connection destination URL “http://www.acme.com” is performed, whereby the virtual keyboard 60 shown in FIG. 4D is displayed on the display unit 22 A of the operation panel 22 .
- FIG. 5C in a state where the information shown in FIG. 5A is registered in the connection destination-based rule table, as a new connection destination for which corresponding user ID and password rule information is unregistered, connection to connection destination URL “http://www.acme.com” is performed, whereby the virtual keyboard 60 shown in FIG. 4D is displayed on the display unit 22 A of the operation panel 22 .
- connection destination information connection destination URL
- user ID and password rule information have been additionally registered in the connection destination-based rule table when, in regard to the user ID, the rule button 62 corresponding to the rule designating the email address of the user attribute information as the user ID has been selected by the user and when, in regard to the password, an operation that inputs the password inside the password input field 52 without selecting the button 66 has been performed by the user.
- connection destination-based rule table is updated to the state shown in FIG. 5C , when, for example, a different user selects as a use target service a service for which connection to the connection destination URL “http://www.acme.com” is necessary, then in accordance with the user ID rule information that has been additionally registered in the connection destination-based rule table in correspondence with the connection destination information (connection destination URL) described above, the email address of the different user becomes displayed in the user ID input field 50 as shown in FIG. 4F .
- step 152 When the user ID has been inputted inside the input field 56 as a result of any of the operations described above being performed, the determination of step 152 becomes NO and the control moves to step 174 , where it is determined, on the basis of whether or not an operation that selects the button 64 has been performed by the user, whether or not generation of rule information that sets, as a fixed value, the user ID inputted into the input field 56 has been instructed.
- this determination is YES
- the control moves to step 176 and generates rule information representing the third type of rule that designates, as a fixed value of the user ID, the user ID inputted inside the input field 56 by the user. Then, the control moves to step 162 .
- step 162 the rule information generated in step 176 is additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time.
- step 164 the authentication information input screen is redisplayed on the display unit 22 A of the operation panel 22 , and the user ID inputted inside the input field 56 of the virtual keyboard 60 is set inside the user ID input field 50 of the authentication information input screen.
- step 150 In a state where the virtual keyboard 60 is displayed on the display unit 22 A of the operation panel 22 in step 150 , when there does not exist a rule button 62 representing a user ID rule matching the user ID application rule in the connection destination this time and the user ID application rule in the connection destination this time is not a fixed value, the user does not select the button 64 inside the virtual keyboard 60 and performs an operation that inputs the user ID inside the input field 56 of the virtual keyboard 60 , whereby the determination of step 174 becomes NO and the control moves to step 178 .
- step 178 it is searched whether or not attribute information completely matching the user ID inputted inside the input field 56 or attribute information partially matching the inputted user ID (attribute information including all characters of the user ID) exists among the pieces of user attribute information acquired in step 106 .
- step 180 it is determined whether or not the corresponding information (attribute information completely matching or partially matching the user ID inputted inside the input field 56 ) has been extracted by the search of step 178 .
- this determination is NO, it is difficult to discriminate the user ID rule from the user ID inputted inside the input field 56 .
- the control moves to step 164 and, without performing generation of rule information or additional registration in the connection destination-based rule table, in step 164 , processing is performed that redisplays the authentication information input screen on the display unit 22 A of the operation panel 22 and sets the user ID inputted inside the input field 56 of the virtual keyboard 60 inside the user ID input field 50 of the authentication information input screen.
- step 180 When the determination of step 180 is YES, the control moves to step 182 and it is determined whether or not attribute information completely matching the user ID inputted inside the input field 56 extracted in the search of step 178 .
- the determination of step 182 it is judged that the user ID rule in the connection destination this time is a rule that uses, as the user ID, the attribute information completely matching the user ID inputted inside the input field 56 .
- the control moves to step 184 , where, as user ID rule information, rule information of content that designates, as a category of attribute information to be used as the user ID, the category of attribute information completely matching the user ID inputted inside the input field 56 is generated and the generated rule information is additionally registered in the rule definition table together with the name of the generated rule information. Thereafter, the control moves to step 162 .
- step 162 the rule information generated in step 184 is additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time.
- step 164 the authentication information input screen is redisplayed on the display unit 22 A of the operation panel 22 , and the user ID inputted inside the input field 56 of the virtual keyboard 60 is set inside the user ID input field 50 of the authentication information input screen.
- step 182 When attribute information that includes all characters of the user ID inputted inside the input field 56 and partially matches the inputted user ID (attribute information where extra characters have been added to the inputted user ID) has been extracted by the search of step 178 , the determination of step 182 becomes NO and the control moves to step 186 , where an editing method for causing the extracted attribute information to completely match the user ID inputted inside the input field 56 is derived.
- This editing method is derived specifically, for example, by generating a first editing method that extracts, from the individual characters configuring the extracted attribute information, the extra characters with respect to the user ID inputted inside the input field 56 and deleting the extracted characters.
- step 188 as user ID rule information, rule information of content that stipulates the user ID by designating the category of attribute information partially matching the user ID inputted inside the input field 56 as the category of attribute information to be used as the user ID and designating the editing method generated in step 186 as the editing method with respect to that category of attribute information is generated, and the generated rule information is additionally registered together with the name of the rule information in the rule definition table.
- the control moves to step 162 .
- rule information that designates the “email address” of the user as the category of attribute information to be used as the user ID and represents extracting “8 characters starting with beginning of character string before ‘@’” as one example of the editing method with respect to “email address” has been additionally registered together with the name “rule 5 ” in the rule definition table.
- step 162 the rule information generated in step 184 is additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time.
- FIG. 5D there is shown a state where the rule information of “rule 5 ” shown in FIG. 5E has been additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information (connection destination URL “http://www.acme.com”).
- the authentication information input screen is redisplayed on the display unit 22 A of the operation panel 22 , and the user ID inputted inside the input field 56 of the virtual keyboard 60 is set inside the user ID input field 50 of the authentication information input screen.
- Step 178 to step 188 and step 162 are one example of processing by a rule management unit of the present invention.
- rule information is generated on the basis of attribute information that includes all characters of the user ID inputted by the user and partially matches the inputted user ID as in steps 186 and 188 of FIG. 3B
- it may also be configured to additionally register plural pieces of rule information in the connection destination-based rule table in correspondence with the same connection destination information and, when a service for which connection to the same connection destination is necessary has been selected as a use target service by a different user, generates plural pieces of authentication information in accordance with the plural kinds of rule information and causes them to be displayed as input target authentication information targets.
- it is desirable for the rule information corresponding to the authentication information which not selected to be deleted from the connection destination-based rule table and the rule definition table.
- any of the first type of rule that designates the category of attribute information to be used as the user ID, the second type of rule that designates the category of attribute information to be used as the user ID and designates the method of editing the designated attribute information, and the third type of rule that designates a fixed value as the user ID is used
- the present invention is not limited to this.
- any of the first type of rule to the third type of rule may also be excluded from the user ID rules and a rule similar to the first type of rule or the second type of rule may also be used as the password rule.
- the present invention is not limited to this. It may also be configured such that, when it has generated the user ID and the password, it transmits the generated user ID and password to the AP server 40 .
- setting and display of the user ID and the password in the corresponding input fields inside the authentication information input screen may be omitted, and display of the authentication information input screen itself may also be omitted.
- the processing that transmits the user ID and the password to the AP server 40 is also one example of processing by the processing unit of the present invention.
- connection destination information connection destination URL
- class of input information user ID and password
- the AP servers 40 are configured to apply screen IDs or the like to the individual authentication information input screens that the connection destination individual AP servers 40 deliver and to apply input field IDs to the individual authentication information input fields (e.g., the user ID or the password input field) inside the individual authentication information input screens and to deliver information in which the corresponding screen ID and input field ID are embedded as the information of the authentication information input screen, it may also be configured to use the combination of the screen ID and the input field ID as the class of the input information and to register the rule information in the rule information table in correspondence with the connection destination information (connection destination URL) and the combination of the screen ID and the input field ID.
- the individual authentication information input fields e.g., the user ID or the password input field
- the screen ID and the input field ID may also be extracted from the information of the authentication information input screen delivered from the AP server 40 , the rule information corresponding to the connection destination URL and the combination of the extracted screen ID and input field ID is read from the rule information table, and the authentication information (e.g., user ID or password) is generated in accordance with the read rule information.
- the authentication information e.g., user ID or password
- the present invention is not limited to this.
- the user may be configured to perform processing that generates the authentication information on the basis of the rule information corresponding to the connection destination and the class of the input information and delivers to the terminal device 26 a screen where the generated authentication information has been set inside the input field inside the authentication information input screen whose information has been delivered from the AP server 40 or transmits the generated authentication information to the AP server 40 and delivers the result thereof to the terminal device 26 .
- the image reading and printing apparatus 14 pertaining to the present exemplary embodiment is caused to function as the information input assistance device pertaining to the present invention, but the present invention is not limited to this.
- electronic devices such as PCs or portable terminals used by plural users may also be caused to function as the information input assistance device pertaining to the present invention, and when authentication information has been requested from a connection destination, these electronic devices may be configured to perform processing that generates the authentication information on the basis of the rule information corresponding to the connection destination and the class of the input information and sets the generated authentication information inside the authentication information input fields of the authentication information input screen delivered from the connection destination or transmits the generated authentication information to the connection destination.
- the identification unit of the present invention may employ a configuration that identifies the user on the basis of user identification information that the individual users have inputted when starting use of the electronic devices.
- the user attribute information table is stored in the storage unit of the management server 36 connected via the network 12 to the image reading and printing apparatus 14 , whereby the storage unit of the management server 36 is used as one example of the first memory recited in claim 1 and the like, but the present invention is not limited to this.
- the present invention may also employ a configuration where the user attribute information table is stored in the storage unit 16 C of the image reading and printing apparatus 14 , whereby the storage unit 16 C of the image reading and printing apparatus 14 is used as one example of the first memory.
- authentication information has been described as one example of input information in the present invention, but the present invention is not limited to this and may also be applied to the input of arbitrary information by a user.
- the aspect that uses individual combinations of screen IDs and input field IDs as the classes of the input information as described above is also easily expanded to input screens other than authentication information input screens and information input fields other than authentication information input fields and is also suitable for the input of arbitrary information other than authentication information by a user.
- the AP server connection program serving as one example of the information input assistance program pertaining to the present invention is stored (installed) beforehand in the storage unit 16 C of the main controller 16 of the image reading and printing apparatus 14 , but the information input assistance program pertaining to the present invention may also be provided in a configuration where it is recoded in a recording medium such as a CD-ROM or a DVD-ROM.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Artificial Intelligence (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
- This application is based on and claims priority under 35 USC 119 from Japanese Patent Application No. 2010-054467 filed Mar. 11, 2010.
- The present invention relates to an information input assistance device, a computer-readable medium storing an information input assistance program, and an information input assistance method.
- According to an aspect of the invention, there is provided an information input assistance device including: an identification unit that identifies a user; a generation unit that acquires attribute information corresponding to the user identified by the identification unit from a first memory which stores attribute information of users in regard to a plurality of users, acquires rule information corresponding to a transmission destination of input information and a class of input information from a second memory which stores, in correspondence with transmission destinations of input information and classes of input information, rule information representing rules for generating input information from attribute information of users, and generates the input information corresponding to the identified user on the basis of the acquired attribute information and the acquired rule information; and a processing unit that performs processing that transmits the input information generated by the generation unit to the transmission destination.
- An exemplary embodiment of the present invention will be described in detail based on the following figures, wherein:
-
FIG. 1 is a block diagram showing the general configuration of a computer system pertaining to the exemplary embodiment; -
FIGS. 2A and 2B are flowcharts showing the content of AP server connection processing; -
FIGS. 3A and 3B are flowcharts showing the content of rule information addition processing; -
FIGS. 4A to 4F are conceptual diagrams each showing one example of an authentication information input screen and a virtual keyboard; and -
FIGS. 5A to 5E are general diagrams each showing one example of a connection destination-based rule table and a rule definition table that configure a rule information table. - An exemplary embodiment of the present invention will be described in detail below with reference to the drawings. In
FIG. 1 , there is shown the general configuration of acomputer system 10 pertaining to the present exemplary embodiment. Thecomputer system 10 is configured of an image reading andprinting apparatus 14,plural terminal devices 26 including personal computers (PCs) or the like, amanagement server 36, and plural application servers (AP servers) 40 being connected to anetwork 12 including a local area network (LAN) or the Internet. - The image reading and
printing apparatus 14 is equipped with amain controller 16 that includes a microcomputer or the like and has a built-inCPU 16A, a built-inmemory 16B, a built-innonvolatile storage unit 16C including a hard disk drive (HDD) or a flash memory, and a built-in network interface (I/F) 16D. Animage reading unit 18 that optically reads reading target documents (paper documents) set thereon and outputs reading image data, animage printing unit 20 that prints an image represented by printing image data inputted thereto on recording paper, anoperation panel 22 disposed with adisplay unit 22A serving as a display unit including an LCD or the like and anoperation unit 22B serving as an input reception unit including a numerical keypad and a touch panel, and acard reader 24 that reads information such as card IDs recorded in IC cards (not shown) carried by individual users of thecomputer system 10 are each connected to themain controller 16. Thecard reader 24 is one example of an identification unit of the present invention. - The network I/
F unit 16D of themain controller 16 is connected to thenetwork 12 and performs communication via thenetwork 12 with theterminal devices 26. A service provision program and an AP server connection program are each installed in thestorage unit 16C of themain controller 16 as programs executed by theCPU 16A. The service provision program is for controlling the operation of each unit of the image reading andprinting apparatus 14 and providing various kinds of services (e.g., copying of documents, printing of documents (printing of documents represented by document data received from theterminal devices 26 or represented by document data registered in databases (DBs) stored in storage units of the AP servers 40), and scan-to-server (a service that reads a document and uploads reading image data to theAP servers 40 to thereby cause the reading image data to be stored in storage areas disposed beforehand on the storage units of the AP servers 40)) to the users. The AP server connection program is for theCPU 16A to perform AP server connection processing described later. Moreover, a rule information table (details described later) is also stored in thestorage unit 16C. Thestorage unit 16C of themain controller 16 is one example of a second memory of the present invention. - The AP server connection program is one aspect of an information input assistance program pertaining to the present invention. In the present exemplary embodiment, the AP server connection program is executed by the
CPU 16A of themain controller 16 of the image reading andprinting apparatus 14, whereby the image reading andprinting apparatus 14 functions as one example of an information input assistance device pertaining to the present invention. - The
individual AP servers 40 are computers for providing services (e.g., as described above, the service that prints DB-registered documents, the scan-to-server service) using the APservers 40 to the users in cooperation with the image reading andprinting apparatus 14. Application programs for realizing the services described above are installed in the storage units of theAP servers 40. Adisplay 28, akeyboard 30, and amouse 32 are each connected to each of the individualterminal devices 26. A user attribute information table in which plural categories of attribute information—such as user IDs, employee numbers, email addresses, and card IDs recorded in IC cards carried by the individual users—are registered in regard to the individual users of thecomputer system 10 is stored in a nonvolatile storage unit (not shown) of themanagement server 36. The storage unit of themanagement server 36 is one example of a first memory of the present invention. - Next, the action of the present exemplary embodiment will be described. The
main controller 16 of the image reading andprinting apparatus 14 performs service provision processing that provides the various kinds of services to the users as a result of the service provision program being executed by theCPU 16A. When a user goes to the place where the image reading andprinting apparatus 14 is installed, undergoes user authentication processing where thecard reader 24 is caused to read information such as the card ID recorded in the IC card carried by the user, and selects a service using one of theAP servers 40 as a use target service, the service provision processing performs processing that calls up the AP server connection program in order to connect to the APserver 40 providing the selected service. Thus, the AP server connection program is executed by theCPU 16A, whereby the AP server connection processing is performed by themain controller 16 of the image reading andprinting apparatus 14. This AP server connection processing will be described below with reference toFIG. 2A and 2B . - In the AP server connection processing, first, in step 100, on the basis of the service selected by the user, the connection destination of the
AP server 40 for receiving provision of that service is recognized and information requesting connection is transmitted to the connection destination it has recognized. In thestorage unit 16C of themain controller 16, there is stored beforehand a connection destination table in which connection destination information (e.g., connection destination uniform resource locators (URLs)) including information of the connectiontarget AP server 40 is registered for each of the individual services using theAP servers 40. In step 100, the connection destination table is searched for the service selected by the user, the corresponding connection destination information is read, and a webpage delivery request is transmitted to the connection destination represented by the connection destination information it has read. - In the
next step 102, the information of the webpage transmitted from the connectiondestination AP server 40 is received to thereby acquire that information. In thenext step 104, it is determined, on the basis of whether or not the screen represented by the information received from theAP server 40 is an authentication information input screen, whether or not input of authentication information is being requested from the APserver 40. When a service for which verification of the user is unnecessary (e.g., a service provided to unspecified users) in the provision of the service has been requested, the APserver 40 delivers to the image reading andprinting apparatus 14 information of another screen (e.g., a screen on which details and the like of the provided service are selectable) other than an authentication information input screen. In this case, the other screen is displayed on thedisplay unit 22A of theoperation panel 22, the determination ofstep 104 becomes NO, the AP server connection processing ends, and the control returns to the service provision processing. - In the provision of the service that prints DB-registered documents or the scan-to-server service, for example, it is necessary to verify the user requesting provision of the service for the purpose of ensuring the security of the DB-registered documents or storing the uploaded data in storage regions that differ per user. In this manner, when the provision of a service for which verification of the user is necessary has been requested, the AP
server 40 delivers to the image reading andprinting apparatus 14 information of an authentication information input screen on which a userID input field 50 and apassword input field 52 are each disposed as shown inFIG. 4A as an example. This authentication information input screen is described in HyperText Markup Language (HTML), and a tag indicating that the field is a user ID input field is added to the userID input field 50 and a tag indicating that the field is the password input field is added to thepassword input field 52. When the image reading andprinting apparatus 14 receives the information of the authentication information input screen, it analyzes the tags added to theinput fields input field 50 is “user ID” and the class of information that should be inputted into theinput field 52 is “password”. When the information of the authentication information input screen has been delivered from the APserver 40, the delivered authentication information input screen is displayed on thedisplay unit 22A of theoperation panel 22, the determination ofstep 104 becomes YES, and the control moves tostep 106. - Among the
AP servers 40, there also exist APservers 40 of a specification that does not deliver the information of the authentication information input screen to the connection source device but delivers only error information indicating that connection is not allowed because it has no authentication information. When the connectiondestination AP server 40 is anAP server 40 of this specification, an authentication information input screen on which a userID input field 50 and apassword input field 52 are each disposed as shown inFIG. 4A as an example is generated by the image reading andprinting apparatus 14 that is a connection source device, and the generated authentication information input screen is displayed on thedisplay unit 22A of theoperation panel 22. In this case also, the determination ofstep 104 becomes YES, and the control moves tostep 106. - In the
next step 106, user identification information (the card ID read from the IC card carried by the user) is transmitted to themanagement server 36 to thereby request attribute information of the user specified by the transmitted user identification information. Thus, themanagement server 36 searches the user attribute information table for the user identification information received from the image reading andprinting apparatus 14, reads from the user attribute information table all of the attribute information (user ID, employee number, email address, etc.) corresponding to the same user as the user identification information received, and transmits all of that attribute information to themain controller 16. Instep 106, themain controller 16 receives these pieces of attribute information and stores them in thememory 16B. - Because of the spread of application service providers (ASPs) and software as a service (SaaS), even in a system installed inside a company where there is the
computer system 10 pertaining to the present exemplary embodiment, configurations where the image reading andprinting apparatus 14 provides services to users in cooperation with the APservers 40 provided by outside service providers are increasing. However, in that case, user IDs for using theAP servers 40 are assigned in accordance with assignment rules on the side of the service providers, and passwords are also set so as to satisfy standards (e.g., numbers of digits and kinds of usable characters) that the service providers have decided upon, so it is necessary for a user receiving provision of services realized as a result of the image reading andprinting apparatus 14 cooperating with theAP servers 40 provided by the outside service providers to input authentication information (user ID and password) that differs per service using theAP servers 40 provided by the mutually different service providers. Even in a system installed inside a company where there is thecomputer system 10 including theAP servers 40, a situation may arise where the authentication information in all of the services provided as a result of the image reading andprinting apparatus 14 cooperating with theAP servers 40 cannot be unified. - For this reason, in the present exemplary embodiment, the rule information table is stored in the
storage unit 16C of themain controller 16. This rule information table is configured from a connection destination-based rule table shown inFIG. 5A and a rule definition table shown inFIG. 5B . The connection destination-based rule table is configured as a result of pieces of rule information representing input information rules each being registered, in regard to mutually different plural kinds of services using theAP servers 40, in correspondence with connection destination information (connection destination URLs) for receiving provision of those services and classes of information (in the example shown inFIG. 5A , “user ID” and “password”) that should be inputted when receiving provision of those services (rule information corresponded with “user ID” represents a rule where a user ID should be inputted when receiving provision of a service, and rule information corresponded with “password” represents a rule where a password should be inputted when receiving provision of a service). The rule definition table is configured as a result of pieces of information representing a name, content, and a type of rule each being registered in regard to all rules applied to at least one class of input information of the classes of input information (e.g., “user ID” and “password”). Of the rule information of the user IDs and passwords registered in the connection destination-based rule table, in regard to a user ID or a password that applies a rule whose content is registered in the rule definition table, only the name of the rule (“rule 1”, “rule 2”, etc.) is registered as the rule information. - In
step 108, the connection destination-based rule table is searched for the connection destination information used in the information transmission in step 100 and the class of input information recognized on the basis of the tags added to the input fields of the authentication information input screen. In thenext step 110, it is determined, on the basis of the result of the search instep 108, whether or not rule information corresponding to the connection destination for receiving provision of the service selected by the user and the class of input information is registered in the connection destination-based rule table. When this determination is YES, the control moves to step 112, reads the corresponding rule information, and causes thememory 16B to store that rule information. Below, description will be advanced taking as an example a case where the classes of input information for receiving provision of the service selected by the user are “user ID” and “password”. - In the
next step 114, the content of the rule represented by the rule information corresponding to the “user ID” class of input information of the rule information read instep 112 is determined and the processing branches depending on the determination result. In the present exemplary embodiment, as rules corresponding to “user ID”, any of a first type (form) of rules (rules FIG. 5B ) that designate a category of the attribute information to be used as the user ID, a second type (form) of rules (rule 4 shown inFIG. 5B ) that designate a category of the attribute information to be used as the user ID and designates a method of editing the designated attribute information, and a third type (form) of rules (see “fixed value ('anonymous')” shown inFIG. 5A ) that designate a fixed value as the user ID is used. In the connection destination-base rule table, any of the first to third types of rules is set as rules corresponding to the user ID for each of the individual connection destinations depending on the user ID application rule in the individual connection destinations. - When the user ID rule information read in
step 112 represents rule content corresponding to the first type of rule, the control moves fromstep 114 to step 116 and attribute information of the category designated by the user ID rule information read instep 112 is extracted as the user ID from among the pieces of user attribute information acquired instep 106. Then, the control moves to step 122. - When the user ID rule information read in
step 112 represents rule content corresponding to the second type of rule, the control moves fromstep 114 to step 118 and attribute information of the category designated by the user ID rule information read instep 112 is extracted from among the pieces of user attribute information acquired instep 106. In thenext step 120, a user ID is generated by editing, in accordance with the editing method designated by the user ID rule information read instep 112, the attribute information extracted instep 118. Then, the control moves to step 122. - When the user ID rule information read in
step 112 represents rule content corresponding to the third type of rule, the control moves fromstep 114 to step 121 and the fixed value stipulated by the rule information is set as the user ID. Then, the control moves to step 122. Step 106 to step 121 described above are, together withstep 128 described below, one example of processing by a generation unit of the present invention. - In
step 122, the user ID obtained by the processing ofstep 116 or step 120 or step 121 is set inside the userID input field 50 of the authentication information input screen being displayed on thedisplay unit 22A of theoperation panel 22. Thus, as shown inFIG. 4B as an example, inside the userID input field 50 of the authentication information input screen, the proper user ID is set and displayed in accordance with the user ID rule (rule information) registered in the connection destination-based rule table and without the user having to perform an operation that inputs the user ID. Step 122 is one example of processing by a processing unit of the present invention. - In
step 124, the content of the rule represented by the rule information corresponding to the “password” class of input information of the rule information read instep 112 is determined and the processing branches depending on the determination result. In the present exemplary embodiment, as rules corresponding to “password”, either of a fourth type (form) of rule (rule 1 shown inFIG. 5B ) that asks the user to input the password and a fifth type (form) of rule (“fixed value (‘’”) shown inFIG. 5A ) that designates a fixed value as the password is used. In the connection destination-based rule table, the fourth type of rule or the fifth type of rule is set as a password rule for each of the individual connection destinations depending on the password application rule (fixed value or not) in the individual connection destinations. - When the password rule information read in
step 112 represents rule content corresponding to the fourth type of rule, the control moves fromstep 124 to step 126 and it is determined whether or not the password has been inputted by the user. Step 126 is repeated until the determination becomes YES. When the password is inputted inside thepassword input field 52 of the authentication information input screen as a result of theoperation unit 22B of theoperation panel 22 being operated by the user, the determination ofstep 126 becomes YES and the control moves to step 132. As an example, inFIG. 4C , there is shown a state where the password has been inputted inside thepassword input field 52 by the user after the user ID has been set and displayed inside the userID input field 50 of the authentication information input screen. - When the password rule information read in
step 112 represents rule content corresponding to the fifth type of rule, the control moves fromstep 124 to step 128 and the fixed value stipulated by the rule information is set as the password. Then, the control moves to step 132. - In the
next step 132, it is determined whether or not transmission of the user ID and the password has been instructed. Step 132 is repeated until the determination becomes YES. As shown inFIGS. 4A to 4C , on the authentication information input screen, there is disposed abutton 54 for instructing transmission of the user ID and the password. When the user verifies the user ID displayed inside theinput field 50 and the password displayed inside theinput field 52 of the authentication information input screen and performs an operation that selects thebutton 54, the determination ofstep 132 becomes YES and the control moves to step 134. Instep 134, the user ID being displayed inside theinput field 50 and the password being displayed inside theinput field 52 of the authentication information input screen are transmitted to the connection destination to which information requesting connection is transmitted in step 100. - Thus, in the connection
destination AP server 40, on the basis of the combination of the user ID and the password received from the image reading andprinting apparatus 14, user authentication processing that verifies whether or not the user requesting provision of a service via the image reading andprinting apparatus 14 is a legitimate user is performed. When it has been verified by the user authentication processing that the user is a legitimate user, theAP server 40 delivers to the image reading andprinting apparatus 14 information of another screen (e.g., a screen on which details and the like of the provided service are selectable) other than the authentication information input screen. When the image reading andprinting apparatus 14 receives this information, it displays on thedisplay unit 22A of theoperation panel 22 the screen (webpage) represented by the information received from theAP server 40 instep 136 and ends the AP server connection processing. Thus, the control returns to the service provision processing. - Next, processing when user ID and password rule information corresponding to the connection destination for receiving provision of the service selected by the user is not registered in the connection destination-based rule table will be described. Examples of cases where this situation arises include connecting to a connection destination to which the image reading and
printing apparatus 14 has not connected in the past. When user ID and password rule information corresponding to the connection destination is not registered in the connection destination-based rule table, the determination ofstep 110 becomes NO and the control moves to step 130, where rule information addition processing is performed. - This rule information addition processing will be described with reference to
FIG. 3A and 3B . Instep 150, as shown inFIG. 4D as an example, thedisplay unit 22A of theoperation panel 22 displays avirtual keyboard 60 disposed with a userID input field 56 andplural keys 58 for inputting the user ID. In thisstep 150, all of the rules (rule information) of the user IDs registered in the rule information table is extracted, thevirtual keyboard 60 additionally displaysrule buttons 62 corresponding to the extracted individual rules, and also thevirtual keyboard 60 additionally displays abutton 64 for instructing generation of rule information that sets as a fixed value the user ID inputted inside theinput field 56. - When some operation is performed by the user with respect to the
virtual keyboard 60 displayed on thedisplay unit 22A of theoperation panel 22, the control moves to step 152 and it is determined whether or not the operation by the user is an operation that selects one of therule buttons 62. When thevirtual keyboard 60 is displayed on thedisplay unit 22A of theoperation panel 22, the user recognizes the user ID application rule in the connection destination this time and judges whether or not the recognized application rule matches a user ID rule represented by any of therule buttons 62 being displayed on thevirtual keyboard 60. When there exists arule button 62 representing a user ID rule matching the recognized application rule, the user performs an operation that selects thatrule button 62. When the operation described above is performed by the user, the determination ofstep 152 becomes YES and the control moves to step 154. - In
step 154, the content of the user ID rule represented by therule button 62 selected by the user is determined and the processing branches depending on the determination result. Here, when the content of the user ID rule represented by therule button 62 selected by the user is rule content corresponding to the first type of rule, the control moves fromstep 154 to step 156 and attribute information of the category designated by the user ID rule represented by therule button 62 selected by the user is extracted as the user ID from among the pieces of user attribute information acquired instep 106. Then, the control moves to step 162. - When the content of the user ID rule represented by the
rule button 62 selected by the user is rule content corresponding to the second type of rule, the control moves fromstep 154 to step 158 and attribute information of the category designated by the user ID rule represented by therule button 62 selected by the user is extracted from among the pieces of user attribute information acquired instep 106. In thenext step 160, a user ID is generated by editing, in accordance with the editing method designated by the user ID rule represented by therule button 62 selected by the user, the attribute information extracted instep 158. Then, the control moves to step 162. - In
step 162, the user ID rule information represented by therule button 62 selected by the user additionally registered in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time. Step 150 to step 164 described above are one example of processing by the generation unit of the present invention. - In
step 164, thedisplay unit 22A of theoperation panel 22 redisplays the authentication information input screen and the user ID generated instep 156 or step 160 is set inside the userID input field 50 of the redisplayed authentication information input screen. Thus, as shown inFIG. 4E as an example, inside the userID input field 50 of the authentication information input screen, the proper user ID is set and displayed in accordance with the user ID rule represented by therule button 62 selected by the user and without the user having to perform an operation that inputs the user ID. - In
step 166, a button 66 (see alsoFIG. 4E ) for instructing generation of rule information that sets as a fixed value the password inputted into thepassword input field 52 additionally displays on the authentication information input screen redisplayed on thedisplay unit 22A of theoperation panel 22. In thenext step 168, it is determined whether or not the password has been inputted by the user. Step 168 is repeated until the determination becomes YES. The user recognizes the password application rule (fixed value or not) in the connection destination this time, and if the recognized application rule is a fixed value, the user selects thebutton 66 on the authentication information input screen and thereafter performs an operation that inputs the password inside thepassword input field 52, and if the recognized application rule is not a fixed value, the user does not select thebutton 66 on the authentication information input screen and performs an operation that inputs the password inside thepassword input field 52. - When the password is inputted inside the
password input field 52 as a result of any of the operations described above being performed, the determination ofstep 168 becomes YES and the control moves to step 170, where it is determined whether or not an operation that selects thebutton 66 has been performed by the user. When this determination is NO, the control moves to step 171 and password rule information representing the fourth type of rule that asks the user to input the password is additionally registered in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time. Then, the rule information addition processing ends. When the determination ofstep 170 is YES, the control moves to step 172 and additionally registers, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time, password rule information representing the fifth type of rule that designates as a fixed value of the password the password inputted inside thepassword input field 52 by the user. Then, the rule information addition processing ends. - As an example, in
FIG. 5C , in a state where the information shown inFIG. 5A is registered in the connection destination-based rule table, as a new connection destination for which corresponding user ID and password rule information is unregistered, connection to connection destination URL “http://www.acme.com” is performed, whereby thevirtual keyboard 60 shown inFIG. 4D is displayed on thedisplay unit 22A of theoperation panel 22.FIG. 5C shows a state where the connection destination information (connection destination URL) and the user ID and password rule information have been additionally registered in the connection destination-based rule table when, in regard to the user ID, therule button 62 corresponding to the rule designating the email address of the user attribute information as the user ID has been selected by the user and when, in regard to the password, an operation that inputs the password inside thepassword input field 52 without selecting thebutton 66 has been performed by the user. - When the connection destination-based rule table is updated to the state shown in
FIG. 5C , when, for example, a different user selects as a use target service a service for which connection to the connection destination URL “http://www.acme.com” is necessary, then in accordance with the user ID rule information that has been additionally registered in the connection destination-based rule table in correspondence with the connection destination information (connection destination URL) described above, the email address of the different user becomes displayed in the userID input field 50 as shown inFIG. 4F . - In a state where the
virtual keyboard 60 is displayed on thedisplay unit 22A of theoperation panel 22 instep 150, when there does not exist arule button 62 representing a user ID rule matching the user ID application rule in the connection destination this time, if the user ID application rule in the connection destination this time is a fixed value, the user selects thebutton 64 inside thevirtual keyboard 60 and thereafter performs an operation that operates thekeys 58 of thevirtual keyboard 60 to input the user ID inside theinput field 56, and if the user ID application rule is not a fixed value, the user does not select thebutton 64 inside thevirtual keyboard 60 and performs an operation that operates thekeys 58 of the virtual keyboard to input the user ID inside theinput field 56. - When the user ID has been inputted inside the
input field 56 as a result of any of the operations described above being performed, the determination ofstep 152 becomes NO and the control moves to step 174, where it is determined, on the basis of whether or not an operation that selects thebutton 64 has been performed by the user, whether or not generation of rule information that sets, as a fixed value, the user ID inputted into theinput field 56 has been instructed. When this determination is YES, the control moves to step 176 and generates rule information representing the third type of rule that designates, as a fixed value of the user ID, the user ID inputted inside theinput field 56 by the user. Then, the control moves to step 162. In this case, instep 162, the rule information generated in step 176 is additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time. In thenext step 164, the authentication information input screen is redisplayed on thedisplay unit 22A of theoperation panel 22, and the user ID inputted inside theinput field 56 of thevirtual keyboard 60 is set inside the userID input field 50 of the authentication information input screen. - In a state where the
virtual keyboard 60 is displayed on thedisplay unit 22A of theoperation panel 22 instep 150, when there does not exist arule button 62 representing a user ID rule matching the user ID application rule in the connection destination this time and the user ID application rule in the connection destination this time is not a fixed value, the user does not select thebutton 64 inside thevirtual keyboard 60 and performs an operation that inputs the user ID inside theinput field 56 of thevirtual keyboard 60, whereby the determination ofstep 174 becomes NO and the control moves to step 178. Instep 178, it is searched whether or not attribute information completely matching the user ID inputted inside theinput field 56 or attribute information partially matching the inputted user ID (attribute information including all characters of the user ID) exists among the pieces of user attribute information acquired instep 106. - In the
next step 180, it is determined whether or not the corresponding information (attribute information completely matching or partially matching the user ID inputted inside the input field 56) has been extracted by the search ofstep 178. When this determination is NO, it is difficult to discriminate the user ID rule from the user ID inputted inside theinput field 56. The control moves to step 164 and, without performing generation of rule information or additional registration in the connection destination-based rule table, instep 164, processing is performed that redisplays the authentication information input screen on thedisplay unit 22A of theoperation panel 22 and sets the user ID inputted inside theinput field 56 of thevirtual keyboard 60 inside the userID input field 50 of the authentication information input screen. - When the determination of
step 180 is YES, the control moves to step 182 and it is determined whether or not attribute information completely matching the user ID inputted inside theinput field 56 extracted in the search ofstep 178. When the determination ofstep 182 is YES, it is judged that the user ID rule in the connection destination this time is a rule that uses, as the user ID, the attribute information completely matching the user ID inputted inside theinput field 56. Then, the control moves to step 184, where, as user ID rule information, rule information of content that designates, as a category of attribute information to be used as the user ID, the category of attribute information completely matching the user ID inputted inside theinput field 56 is generated and the generated rule information is additionally registered in the rule definition table together with the name of the generated rule information. Thereafter, the control moves to step 162. - In this case, in
step 162, the rule information generated instep 184 is additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time. In thenext step 164, the authentication information input screen is redisplayed on thedisplay unit 22A of theoperation panel 22, and the user ID inputted inside theinput field 56 of thevirtual keyboard 60 is set inside the userID input field 50 of the authentication information input screen. Once the processing described above is performed, when, for example, a different user selects as a use target service a service for which connection to the connection destination URL “http://www.acme.com” is necessary, then in accordance with the user ID rule information that has been additionally registered in the connection destination-based rule table in correspondence with the connection destination information (connection destination URL) described above, the attribute information of the different user whose category is designated by that rule information becomes set and displayed in the userID input field 50. - When attribute information that includes all characters of the user ID inputted inside the
input field 56 and partially matches the inputted user ID (attribute information where extra characters have been added to the inputted user ID) has been extracted by the search ofstep 178, the determination ofstep 182 becomes NO and the control moves to step 186, where an editing method for causing the extracted attribute information to completely match the user ID inputted inside theinput field 56 is derived. This editing method is derived specifically, for example, by generating a first editing method that extracts, from the individual characters configuring the extracted attribute information, the extra characters with respect to the user ID inputted inside theinput field 56 and deleting the extracted characters. When the character string after deleting the extra characters in accordance with the first editing method generated from the extracted attribute information does not match the user ID inputted inside theinput field 56, a second editing method that changes the order of the characters in that character string is generated such that it matches the user ID inputted inside theinput field 56. - In the
next step 188, as user ID rule information, rule information of content that stipulates the user ID by designating the category of attribute information partially matching the user ID inputted inside theinput field 56 as the category of attribute information to be used as the user ID and designating the editing method generated instep 186 as the editing method with respect to that category of attribute information is generated, and the generated rule information is additionally registered together with the name of the rule information in the rule definition table. Thereafter, the control moves to step 162. As an example, inFIG. 5E , there is shown a state where rule information that designates the “email address” of the user as the category of attribute information to be used as the user ID and represents extracting “8 characters starting with beginning of character string before ‘@’” as one example of the editing method with respect to “email address” has been additionally registered together with the name “rule 5” in the rule definition table. - In this case, in
step 162, the rule information generated instep 184 is additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information of the connection destination this time. As an example, inFIG. 5D , there is shown a state where the rule information of “rule 5” shown inFIG. 5E has been additionally registered, as user ID rule information, in the connection destination-based rule table in correspondence with the connection destination information (connection destination URL “http://www.acme.com”). In thenext step 164, the authentication information input screen is redisplayed on thedisplay unit 22A of theoperation panel 22, and the user ID inputted inside theinput field 56 of thevirtual keyboard 60 is set inside the userID input field 50 of the authentication information input screen. - Once the processing described above is performed, when, for example, a different user selects as a use target service a service for which connection to the connection destination URL “http://www.acme.com” is necessary, then in accordance with the user ID rule information (“
rule 5”) that has been additionally registered in the connection destination-based rule table in correspondence with the connection destination information (connection destination URL) described above, the character string of the 8 characters starting with the beginning of the character string before “@” in the email address of the different user becomes set and displayed in the userID input field 50. Step 178 to step 188 and step 162 are one example of processing by a rule management unit of the present invention. - When rule information is generated on the basis of attribute information that includes all characters of the user ID inputted by the user and partially matches the inputted user ID as in
steps FIG. 3B , a case where plural kinds of rule information are capable of being generated may also arise because, for example, of the reason that plural pieces of attribute information matching the conditions described above exist. In this case, it may also be configured to additionally register plural pieces of rule information in the connection destination-based rule table in correspondence with the same connection destination information and, when a service for which connection to the same connection destination is necessary has been selected as a use target service by a different user, generates plural pieces of authentication information in accordance with the plural kinds of rule information and causes them to be displayed as input target authentication information targets. In this case, when any of the pieces of authentication information is selected, it is desirable for the rule information corresponding to the authentication information which not selected to be deleted from the connection destination-based rule table and the rule definition table. - In the description above, there has been described an aspect where, as a user ID rule, any of the first type of rule that designates the category of attribute information to be used as the user ID, the second type of rule that designates the category of attribute information to be used as the user ID and designates the method of editing the designated attribute information, and the third type of rule that designates a fixed value as the user ID is used, and where, as a password rule, either of the fourth type of rule that asks the user to input the password and the fifth type of rule that designates a fixed value as the password is used, but the present invention is not limited to this. For example, any of the first type of rule to the third type of rule may also be excluded from the user ID rules and a rule similar to the first type of rule or the second type of rule may also be used as the password rule.
- In the description above, there has been described an aspect where, when the authentication information such as the user ID or the password is generated, the generated authentication information is set and displayed in the corresponding input field inside the authentication information input screen and the generated authentication information is transmitted to the
AP server 40 upon receiving an instruction from the user, but the present invention is not limited to this. It may also be configured such that, when it has generated the user ID and the password, it transmits the generated user ID and password to theAP server 40. In this case, setting and display of the user ID and the password in the corresponding input fields inside the authentication information input screen may be omitted, and display of the authentication information input screen itself may also be omitted. In this aspect, the processing that transmits the user ID and the password to theAP server 40 is also one example of processing by the processing unit of the present invention. - In the description above, there has been described an aspect where the rule information in correspondence with the connection destination information (connection destination URL) and the class of input information (user ID and password) for each of the individual connection destinations is registered in the connection destination-based rule table of the rule information table, but the present invention is not limited to this. When the
AP servers 40 are configured to apply screen IDs or the like to the individual authentication information input screens that the connection destinationindividual AP servers 40 deliver and to apply input field IDs to the individual authentication information input fields (e.g., the user ID or the password input field) inside the individual authentication information input screens and to deliver information in which the corresponding screen ID and input field ID are embedded as the information of the authentication information input screen, it may also be configured to use the combination of the screen ID and the input field ID as the class of the input information and to register the rule information in the rule information table in correspondence with the connection destination information (connection destination URL) and the combination of the screen ID and the input field ID. In this case, the screen ID and the input field ID may also be extracted from the information of the authentication information input screen delivered from theAP server 40, the rule information corresponding to the connection destination URL and the combination of the extracted screen ID and input field ID is read from the rule information table, and the authentication information (e.g., user ID or password) is generated in accordance with the read rule information. - In the description above, there has been described an aspect where the user receiving provision of a service using one of the
AP servers 40 operates theoperation panel 22 of the image reading andprinting apparatus 14, but the present invention is not limited to this. For example, in an aspect where the user performs an instruction for receiving provision of a service or input of authentication information via theterminal device 26 and the image reading andprinting apparatus 14 receiving this instruction or authentication information via thenetwork 12 connects to theAP server 40, it may be configured to perform processing that generates the authentication information on the basis of the rule information corresponding to the connection destination and the class of the input information and delivers to the terminal device 26 a screen where the generated authentication information has been set inside the input field inside the authentication information input screen whose information has been delivered from theAP server 40 or transmits the generated authentication information to theAP server 40 and delivers the result thereof to theterminal device 26. - In the description above, there has been described an aspect where the image reading and
printing apparatus 14 pertaining to the present exemplary embodiment is caused to function as the information input assistance device pertaining to the present invention, but the present invention is not limited to this. For example, electronic devices such as PCs or portable terminals used by plural users may also be caused to function as the information input assistance device pertaining to the present invention, and when authentication information has been requested from a connection destination, these electronic devices may be configured to perform processing that generates the authentication information on the basis of the rule information corresponding to the connection destination and the class of the input information and sets the generated authentication information inside the authentication information input fields of the authentication information input screen delivered from the connection destination or transmits the generated authentication information to the connection destination. In this case, the identification unit of the present invention may employ a configuration that identifies the user on the basis of user identification information that the individual users have inputted when starting use of the electronic devices. - In the description above, the user attribute information table is stored in the storage unit of the
management server 36 connected via thenetwork 12 to the image reading andprinting apparatus 14, whereby the storage unit of themanagement server 36 is used as one example of the first memory recited inclaim 1 and the like, but the present invention is not limited to this. The present invention may also employ a configuration where the user attribute information table is stored in thestorage unit 16C of the image reading andprinting apparatus 14, whereby thestorage unit 16C of the image reading andprinting apparatus 14 is used as one example of the first memory. - Moreover, in the description above, authentication information has been described as one example of input information in the present invention, but the present invention is not limited to this and may also be applied to the input of arbitrary information by a user. In particular, the aspect that uses individual combinations of screen IDs and input field IDs as the classes of the input information as described above is also easily expanded to input screens other than authentication information input screens and information input fields other than authentication information input fields and is also suitable for the input of arbitrary information other than authentication information by a user.
- In the description above, there has been described an aspect where the AP server connection program serving as one example of the information input assistance program pertaining to the present invention is stored (installed) beforehand in the
storage unit 16C of themain controller 16 of the image reading andprinting apparatus 14, but the information input assistance program pertaining to the present invention may also be provided in a configuration where it is recoded in a recording medium such as a CD-ROM or a DVD-ROM. - The foregoing description of the embodiments of the present invention has been provided for the purpose of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to practitioners skilled in the art. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, thereby enabling others skilled in the art to be suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalents.
Claims (10)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-054467 | 2010-03-11 | ||
JP2010054467A JP5471632B2 (en) | 2010-03-11 | 2010-03-11 | Information input support device and program |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110225628A1 true US20110225628A1 (en) | 2011-09-15 |
US8561141B2 US8561141B2 (en) | 2013-10-15 |
Family
ID=44561182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/858,939 Expired - Fee Related US8561141B2 (en) | 2010-03-11 | 2010-08-18 | Information input assistance device, computer-readable medium, and information input assistance method |
Country Status (3)
Country | Link |
---|---|
US (1) | US8561141B2 (en) |
JP (1) | JP5471632B2 (en) |
CN (1) | CN102193623B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150156139A1 (en) * | 2011-04-30 | 2015-06-04 | Vmware, Inc. | Dynamic Management Of Groups For Entitlement And Provisioning Of Computer Resources |
US20150289300A1 (en) * | 2014-04-04 | 2015-10-08 | Time Warner Cable Enterprises Llc | Correlation of communication devices and subscriber information |
US20170242991A1 (en) * | 2016-02-22 | 2017-08-24 | Nice-Systems Ltd. | System and method for resolving user identification |
US10185408B2 (en) | 2013-09-10 | 2019-01-22 | Samsung Electronics Co., Ltd. | Method and system for inputting in electronic device with a touch input and a proximity input |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6629246B1 (en) * | 1999-04-28 | 2003-09-30 | Sun Microsystems, Inc. | Single sign-on for a network system that includes multiple separately-controlled restricted access resources |
US20050027990A1 (en) * | 2002-03-05 | 2005-02-03 | Hideharu Ogawa | Authentication apparatus, authentication method, and program |
US20080074693A1 (en) * | 2006-09-26 | 2008-03-27 | Konica Minolta Business Technologies, Inc. | Image processing apparatus, information transmission method and image processing system |
US20090125972A1 (en) * | 2007-11-14 | 2009-05-14 | Heather Maria Hinton | Federated single sign-on (f-sso) request processing using a trust chain having a custom module |
US20090271632A1 (en) * | 2008-04-23 | 2009-10-29 | Panasonic Corporation | Secret authentication system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11306171A (en) * | 1998-04-20 | 1999-11-05 | Fujitsu Ltd | Item information input method and recording medium |
JP2000155633A (en) * | 1998-11-24 | 2000-06-06 | Casio Comput Co Ltd | Data input processor and recording medium |
JP2000207362A (en) | 1999-01-19 | 2000-07-28 | Toshiba Corp | Network system and its user authenticating method |
JP2002032341A (en) | 2000-07-17 | 2002-01-31 | Toshiharu Soma | Management and input of indentification number and password for electronic transaction |
JP2002324051A (en) | 2001-04-26 | 2002-11-08 | Fuji Xerox Co Ltd | Method and apparatus for user identification |
JP2005275488A (en) * | 2004-03-23 | 2005-10-06 | Nippon Telegr & Teleph Corp <Ntt> | Input support method and program |
JP5366178B2 (en) * | 2008-05-22 | 2013-12-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method for supporting input to input items of web page, computer program, and terminal |
JP2010020698A (en) * | 2008-07-14 | 2010-01-28 | Ricoh Co Ltd | Information processing system, information processing method, information processing program and recording medium |
CN101546261B (en) * | 2008-10-10 | 2011-07-20 | 华中科技大学 | Secure web page tag library system supported by multiple strategies |
-
2010
- 2010-03-11 JP JP2010054467A patent/JP5471632B2/en not_active Expired - Fee Related
- 2010-08-18 US US12/858,939 patent/US8561141B2/en not_active Expired - Fee Related
- 2010-09-06 CN CN201010275034.3A patent/CN102193623B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6629246B1 (en) * | 1999-04-28 | 2003-09-30 | Sun Microsystems, Inc. | Single sign-on for a network system that includes multiple separately-controlled restricted access resources |
US20050027990A1 (en) * | 2002-03-05 | 2005-02-03 | Hideharu Ogawa | Authentication apparatus, authentication method, and program |
US20080074693A1 (en) * | 2006-09-26 | 2008-03-27 | Konica Minolta Business Technologies, Inc. | Image processing apparatus, information transmission method and image processing system |
US20090125972A1 (en) * | 2007-11-14 | 2009-05-14 | Heather Maria Hinton | Federated single sign-on (f-sso) request processing using a trust chain having a custom module |
US20090271632A1 (en) * | 2008-04-23 | 2009-10-29 | Panasonic Corporation | Secret authentication system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150156139A1 (en) * | 2011-04-30 | 2015-06-04 | Vmware, Inc. | Dynamic Management Of Groups For Entitlement And Provisioning Of Computer Resources |
US9491116B2 (en) * | 2011-04-30 | 2016-11-08 | Vmware, Inc. | Dynamic management of groups for entitlement and provisioning of computer resources |
US10185408B2 (en) | 2013-09-10 | 2019-01-22 | Samsung Electronics Co., Ltd. | Method and system for inputting in electronic device with a touch input and a proximity input |
US20150289300A1 (en) * | 2014-04-04 | 2015-10-08 | Time Warner Cable Enterprises Llc | Correlation of communication devices and subscriber information |
US9474093B2 (en) * | 2014-04-04 | 2016-10-18 | Time Warner Cable Enterprises Llc | Correlation of communication devices and subscriber information |
US20170242991A1 (en) * | 2016-02-22 | 2017-08-24 | Nice-Systems Ltd. | System and method for resolving user identification |
US10409970B2 (en) * | 2016-02-22 | 2019-09-10 | Nice Ltd. | System and method for resolving user identification |
Also Published As
Publication number | Publication date |
---|---|
US8561141B2 (en) | 2013-10-15 |
CN102193623B (en) | 2015-07-15 |
JP5471632B2 (en) | 2014-04-16 |
CN102193623A (en) | 2011-09-21 |
JP2011187010A (en) | 2011-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8553245B2 (en) | Management of image forming apparatus based on user authentication | |
US9418217B2 (en) | Information processing system and information processing method | |
JP4470069B2 (en) | Input assist device, input assist system, input assist method, and input assist program | |
US8760729B2 (en) | Information processing apparatus, information management method, and information management program | |
US20070022467A1 (en) | Method and system for limiting access to a shared network device | |
JP2007128208A (en) | Image processor | |
US10846381B2 (en) | Authentication selection for information processing apparatus, information processing method, and non-transitory computer readable medium | |
US10180814B2 (en) | User terminal, image processing device and cloud server to identify plural user information to execute an image processing job upon validating an user information | |
US20140173715A1 (en) | Information processing system, information processing method, device, and authentication apparatus | |
JP2008251009A (en) | Method and peripheral device for installing target-device's driver in end-user's computer | |
JP2011257935A (en) | Software distribution method, information processing apparatus, and information processing system | |
US20200358913A1 (en) | Information processing apparatus, and non-transitory computer readable medium | |
US8561141B2 (en) | Information input assistance device, computer-readable medium, and information input assistance method | |
JP2014179027A (en) | System, image forming system, information processing method, and program | |
US10203844B2 (en) | Information processing apparatus, information processing system, and method | |
JP4826428B2 (en) | Information processing system, information processing apparatus, and information processing program | |
CN104683622A (en) | Information processing apparatus and method of controlling the same | |
JP2009252041A (en) | Business form image management system, method, and program | |
JP2006113797A (en) | Network printer system and document print method | |
JP2004310463A (en) | Document storage system, document storage device, and document storage method | |
JP5900204B2 (en) | Document processing apparatus and program | |
JP4832181B2 (en) | CONTROL METHOD FOR PRINT CONTROL DEVICE, PRINT CONTROL DEVICE, PRINT SYSTEM, TERMINAL, PRINT PROCESSING PROGRAM FOR PRINT CONTROL DEVICE, PRINTER DRIVER PROGRAM, AND VIRTUAL PRINTER DRIVER PROGRAM | |
US8810831B2 (en) | Print control apparatus, image forming apparatus and computer readable medium storing program | |
US20190281037A1 (en) | Apparatus, authentication system, and authentication method | |
US20230095325A1 (en) | Information processing apparatus, information processing system, data processing method, and non-transitory recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJI XEROX CO., LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HIROSE, AKIRA;REEL/FRAME:024855/0881 Effective date: 20100714 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20211015 |